As part of the vx-underground x @SentinelOne Malware Research Challenge, DLL_Cool_J released a paper on state sponsored Threat Actors targeting security researchers by weaponizing tools such as Ghidra.
This paper also provides historical examples.
https://www.sentinelone.com/blog/analyzing-attack-opportunities-against-information-security-practitioners/
This paper also provides historical examples.
https://www.sentinelone.com/blog/analyzing-attack-opportunities-against-information-security-practitioners/
SentinelOne
Analyzing Attack Opportunities Against Information Security Practitioners
Security researchers are increasingly targeted for attack. In this guest post, Jared Stroud explores the risks and how practitioners can protect themselves.
π23β€7π₯5
How do you pronounce "CVE"?
1. C. V. E.
2. Svye
3. KaVooEe
1. C. V. E.
2. Svye
3. KaVooEe
π€91π€£65π―14π«‘12π5π3π€―3β€βπ₯2π2π₯1π1
People have been discussing the "death" of infosec Twitter. They have defined it's decline based on the number of KaVooEe's discussed each month.
Infosec is more than just KaVooEe's.
Infosec is more than just KaVooEe's.
π€£72π7β€2
We've updated the vx-underground malware source code collection on GitHub
- Javascript.Kaoom.Unknown
- Panel.BlackHole.IonCube.a
- Win32.GreenDamCensor.Exploit.a
- Win32.Bootkit.BlackLotus.b
https://github.com/vxunderground/MalwareSourceCode
- Javascript.Kaoom.Unknown
- Panel.BlackHole.IonCube.a
- Win32.GreenDamCensor.Exploit.a
- Win32.Bootkit.BlackLotus.b
https://github.com/vxunderground/MalwareSourceCode
GitHub
GitHub - vxunderground/MalwareSourceCode: Collection of malware source code for a variety of platforms in an array of differentβ¦
Collection of malware source code for a variety of platforms in an array of different programming languages. - vxunderground/MalwareSourceCode
β€29β€βπ₯7π6π±2π«‘1
Group-IBβs co-founder, Ilya Sachkov, has been convicted of treason and sentenced to 14 years in prison by a Moscow court.
More information:
https://www.group-ib.com/media-center/press-releases/statement-on-the-conviction-of-ilya-sachkov/
More information:
https://www.group-ib.com/media-center/press-releases/statement-on-the-conviction-of-ilya-sachkov/
Group-IB
Statement on the conviction of Ilya Sachkov, co-founder of Group-IB
Group-IB has today learned that Group-IBβs co-founder, Ilya Sachkov, has been convicted of treason and sentenced to 14 years in prison by a Moscow court following an unreasonably rushed trial.
π’53π€£21π«‘10π6π₯3π2π1π€ͺ1
Today David Grusch, an individual who served 14 years with the United States Air Force and National Geospatial Intelligence Agency, testified under oath that the United States government possesses 'Unidentified Anomalous Phenomena' and has been reverse engineering it for decades
More info: https://www.cbsnews.com/news/ufo-hearing-congress-uap-takeaways-whistleblower-conference-david-grusch-2023/
More info: https://www.cbsnews.com/news/ufo-hearing-congress-uap-takeaways-whistleblower-conference-david-grusch-2023/
CBS News
UFO hearing key takeaways: What a whistleblower told Congress about UAPs
A former military intelligence officer-turned-whistleblower told House lawmakers that Congress is being kept in the dark about unidentified anomalous phenomena.
π€£48π±14π7π5π€―5π₯4β€2β€βπ₯1
Today haveibeenpwned announced they have acquired the Breached Forum database. An individual using the alias "breached_db" compromised Breached in November, 2022. This was when Pompompurin was the administrator.
This database leak exposes PII on 212,000 users.
This database leak exposes PII on 212,000 users.
π57π€―19π15π’8
With Web Environment Integrity in Chromium (Chrome, Opera, Edge) it'll allow websites to determine whether a visitor is a human or a robot based off of hardware fingerprinting.
It is designed to enhance ad delivery capabilities.
https://twitter.com/nearcyan/status/1684242509847822336
It is designed to enhance ad delivery capabilities.
https://twitter.com/nearcyan/status/1684242509847822336
π€42π±18π’16π€―8π5π€£5π«‘5β€2π1π―1
In the past month nerds have been complaining of a worm on Activision's MW2 (2009)
A shared sample shows a sideloaded 32bit dsound.dll with some silly strings. It hooks DirectSoundCreate8 and then begins to work
We have only briefly skimmed the file. We'll share the sample
A shared sample shows a sideloaded 32bit dsound.dll with some silly strings. It hooks DirectSoundCreate8 and then begins to work
We have only briefly skimmed the file. We'll share the sample
π±38π10β€7π€3π€―1
The sample is available on the vx-underground website. It is located under /Tmp/
Hash: CB000ABED31B92B4F3F895A633EF0FFAF01A1BE0DFC73619ACF98C1605A5999D
Hash: CB000ABED31B92B4F3F895A633EF0FFAF01A1BE0DFC73619ACF98C1605A5999D
β€24π6β€βπ₯3π’2
We're in the process of re-verifying our APT sample and paper collection while simultaneously renaming directory structures to improve legibility.
Behold! It is beautiful =D
Behold! It is beautiful =D
β€47π₯7π₯°3π€2